Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
- Katharina KrombholzFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Johanna UllrichSBA ResearchVerified email at sba-research.org
- Isao EchizenNational Institute of Informatics / University of Tokyo / SOKENDAIVerified email at nii.ac.jp
- Georg MerzdovnikSBA ResearchVerified email at sba-research.org
- Yeoul NaApple IncVerified email at apple.com
- Stijn VolckaertAssociate Professor, DistriNet, KU LeuvenVerified email at kuleuven.be
- Martin Schmiedecker (Mulazzani)Bosch Engineering GmbHVerified email at schmiedecker.net
- David RupprechtRuhr-University BochumVerified email at rub.de
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
- Matthew SmithProfessor of Computer Science, Universität BonnVerified email at cs.uni-bonn.de
- Joseph NashUniversity of California-IrvineVerified email at uci.edu
- Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
- Cristiano GiuffridaAssociate Professor, Vrije Universiteit AmsterdamVerified email at cs.vu.nl
- Taddeus KroesVrije Universiteit AmsterdamVerified email at vu.nl
- Per LarsenImmunant, Inc.Verified email at immunant.com
- Paul KirthGoogleVerified email at uci.edu
- Wolfgang KastnerAutomation Systems Group, TU WienVerified email at auto.tuwien.ac.at
- Alexander PonticelloDoctoral Researcher, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de